Network Security and Ecommerce
Network Security and Ecommerce
Network Security and Ecommerce
KANENGONI
Lesson 4. S.E.T
TEACH A COURSE 2
Cryptography
RECAP
We will cover these skills:
Basic terminology
Symmetric Encryption
Asymmetric Encryption
TEACH A COURSE 3
SOME BASIC
TERMINOLOGY
ciphers
• can recognise these since have the same frequency distribution as the original
text
SYMMETRIC
ENCRYPTION
X = DK(Y)
• assume encryption algorithm is known
• implies a secure channel to distribute key
TEACH A COURSE 12
Network Security
• This aims at securing the confidentiality and accessibility of the data and
network.
• Every company or organisation that handles large amount of data, has a degree
of solutions against many cyber threats.
Network Security
1. Users
2. Locations
3. Data
4. Devices
5. Applications
Network Security Levels
Physical Network Security: This is the most basic level that includes protecting
the data and network though unauthorized personnel from acquiring the control
over the confidentiality of the network.
• In present day scenario security of the system is the sole priority of any
organisation.
• The main aim of any organisation is to protect their data from attackers.
• In cryptography, attacks are of two types such as Passive attacks and Active
attacks.
Network Security Principles
Integrity: Gives the assurance that the information received is exact and accurate.
Non-Repudiation: A mechanism that prevents the denial of the message content sent
through a network.
Network Security Principles
1) Access control: Not every person should have complete allowance to the
accessibility to the network or its data. The one way to examine this is by going
through each personnel’s details. This is done through Network Access Control
which ensures that only a handful of authorized personnel must be able to work
with allowed amount of resources.
3) Cloud Security: Now a day, a lot many organisations are joining hands with the
cloud technology where a large amount of important data is stored over the internet.
Many businesses embrace SaaS applications for providing some of its employees
the allowance of accessing the data stored over the cloud.
Network Security Model
A Network Security Model exhibits how the security service has been
designed over the network to prevent the opponent from causing a threat
to the confidentiality or authenticity of the information that is being
transmitted through the network.
Network Security Model
Network Security Model
This model shows that there are four basic tasks in designing a particular security
service:
TEACH A COURSE 24
Network Security Protocols
Network Security Protocols provides secure connection between two points that is
the client and the server over a network or internet.
• The protocols needed for secure key exchange and key management are defined
in it.
Uses of (IPSec)
• To provide security for routers sending routing data across the public internet.
• To provide authentication without encryption, like to authenticate that the data
originates from a known sender.
• To protect network data by setting up circuits using IPsec tunneling in which all
data is being sent between the two endpoints is encrypted, as with a Virtual
Private Network(VPN) connection.
IPSec Architecture
• IPSec (IP Security) architecture uses two protocols to secure the traffic or data
flow.
• Secure Socket Layer (SSL) provides security to the data that is transferred
between web browser and server.
• SSL encrypts the link between a web server and a browser which ensures that all
data passed between them remain private and free from attack.
Transport Layer Security (TLS)
• TLS was derived from a security protocol called Secure Service Layer (SSL).
• TLS ensures that no third party may eavesdrops or tampers with any message.
Benefits of TLS/SSL
TEACH A COURSE 34
Secure Electronic Transaction
(SET) Protocol
• Secure Electronic Transaction or SET is a system that ensures the security and
integrity of electronic transactions done using credit cards in a scenario.
• SET is not some system that enables payment but it is a security protocol applied
to those payments.
• It uses different encryption and hashing techniques to secure payments over the
internet done through credit cards.
SET Protocol Scenario
• SET protocol restricts the revealing of credit card details to merchants thus keeping hackers
and thieves at bay. The SET protocol includes Certification Authorities for making use of
standard Digital Certificates like X.509 Certificate.
REQUIREMENTS in SET
• It has to be resistive against message modifications i.e., no changes should be allowed in the
content being transmitted.
• SET also needs to provide interoperability and make use of the best security mechanisms
SET Functionalities
1. Provide Authentication
3. Provide Message Integrity: SET doesn’t allow message modification with the help of
signatures. Messages are protected against unauthorized modification using RSA digital signatures
with SHA-1 and some using HMAC with SHA-1,
eCommerce
Security
We will cover these skills:
What it is ECommerce
Security issues with
Ecommerce
Protection against
ecommerce threats
TEACH A COURSE 40
What is E-Commerce?
Refers to the exchange of goods and services over
the Internet
Consumer transactions
Business to business transactions
Service industry transactions
What is E-Commerce?
Refers to the exchange of goods and services over
the Internet
Consumer transactions
Business to business transactions
Service industry transactions
What is the problem?
Providing a secure and safe environment for
consumers to do business online
No side effects
Must provide:
• Authentication
• Authorization
• Encryption
• Auditing
Why is this important to you?
E-Commerce affects anyone who shops online
Unsecure e-commerce can lead to identity theft,
credit card theft, vulnerable bank accounts, etc
Companies that consumers are associated with
can be affected and therefore indirectly affect the
consumer
What is being done about e-commerce security
issues?
Build security into web applications in the design
state
• Detailed Risk assessment
• Key information
Transaction details
Analyze threats
Countermeasures
SSL – Secure Socket Layer
Visa & Mastercard developed SET
What is being done about e-commerce security
issues? (cont.)
Firewalls
Many companies use the Kerberos protocol
Microsoft, Verisign & Webmethods developed XML
(Extensible Markup Language) key management
specification (XKMS)
Encryption of private information
What can you do to protect yourself?
Keep private data safe
Install a firewall
Use anti-virus software
Be smart about the sites you visit
What does the future hold for this issue?
E-commerce is safer than ever
It’s up to you
It’s up to merchants
US e-commerce sales will nearly double in the
next five years
Wi-Fi Security